[go: up one dir, main page]

GB2610344A - Secure chip identification using resistive processing unit as a physically unclonable function - Google Patents

Secure chip identification using resistive processing unit as a physically unclonable function Download PDF

Info

Publication number
GB2610344A
GB2610344A GB2217559.0A GB202217559A GB2610344A GB 2610344 A GB2610344 A GB 2610344A GB 202217559 A GB202217559 A GB 202217559A GB 2610344 A GB2610344 A GB 2610344A
Authority
GB
United Kingdom
Prior art keywords
values
midrange
rpus
condition
high values
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB2217559.0A
Other versions
GB2610344B (en
GB202217559D0 (en
Inventor
Kumar Arvind
Ando Tasashi
Pfeiffer Dirk
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of GB202217559D0 publication Critical patent/GB202217559D0/en
Publication of GB2610344A publication Critical patent/GB2610344A/en
Application granted granted Critical
Publication of GB2610344B publication Critical patent/GB2610344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C13/00Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
    • G11C13/0002Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
    • G11C13/0021Auxiliary circuits
    • G11C13/0059Security or protection circuits or methods
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C13/00Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
    • G11C13/0002Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
    • G11C13/0021Auxiliary circuits
    • G11C13/004Reading or sensing circuits or methods
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C13/00Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00
    • G11C13/0002Digital stores characterised by the use of storage elements not covered by groups G11C11/00, G11C23/00, or G11C25/00 using resistive RAM [RRAM] elements
    • G11C13/0021Auxiliary circuits
    • G11C13/0064Verifying circuits or methods
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C8/00Arrangements for selecting an address in a digital store
    • G11C8/20Address safety or protection circuits, i.e. arrangements for preventing unauthorized or accidental access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/04Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
    • G11C29/08Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
    • G11C29/12Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
    • G11C2029/4402Internal storage of test result, quality data, chip identification, repair information
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/04Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
    • G11C29/50Marginal testing, e.g. race, voltage or current testing
    • G11C2029/5002Characteristic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)
  • Design And Manufacture Of Integrated Circuits (AREA)
  • Semiconductor Integrated Circuits (AREA)
  • Non-Adjustable Resistors (AREA)
  • Saccharide Compounds (AREA)
  • Logic Circuits (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A technique relates to biasing, using a control system (220), a crossbar array (100) of resistive processing units (102) under a midrange condition, the midrange condition causing resistances of the resistive processing units (102) to result in a random output of low values and high values in about equal proportions. The control system (220) reinforces the low values and the high values of the random output by setting the resistances of the resistive processing units (102) to a state that forces the low values and the high values having resulted from the midrange condition. Reinforcing the low values and the high values makes the random output permanent even when the crossbar array (100) of the resistive processing units (102) is not biased under the midrange condition. The control system (220) records a sequence of the low values and the high values of the random output responsive to reinforcing the low values and the high values of the random output.

Claims (20)

1. A computer-implemented method for identification, the computer-implemented method comprising: biasing, using a control system, a crossbar array of resistive processing units (RPUs) under a midrange condition, the midrange condition causing resistances of the RPUs to result in a random output of low values and high values in about equal proportions; reinforcing, using the control system, the low values and the high values of the random output by setting the resistances of the RPUs to a state that forces the low values and the high values having resulted from the midrange condition, reinforcing the low values and the high values making the random output permanent even when the crossbar array of the RPUs is not biased under the midrange condition; and recording, using the control system, a sequence of the low values and the high values of the random output responsive to reinforcing the low values and the high values of the random output.
2. The computer-implemented method of claim 1, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response.
3. The computer-implemented method of claim 1, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response of the low values and the high values in the about equal proportions.
4. The computer-implemented method of claim 1, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses under the midrange condition that drive the resistances of the RPUs.
5. The computer-implemented method of claim 1, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses to shift resistance values up and down to ensure the low values and the high values in the about equal proportions.
6. The computer-implemented method of claim 1, wherein the crossbar array of the RPUs is configured to be authenticated by reading out a verification sequence that matches the random output, the verification sequence being read out under a different condition than the midrange condition.
7. The computer-implemented method of claim 1 further comprising preventing the resistances of the RPUs from being subsequently programmed, responsive to recording the sequence of the low values and the high values of the random output.
8. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform operations comprising: biasing a crossbar array of resistive processing units (RPUs) under a midrange condition, the midrange condition causing resistances of the RPUs to result in a random output of low values and high values in about equal proportions; reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to a state that forces the low values and the high values having resulted from the midrange condition, reinforcing the low values and the high values making the random output permanent even when the crossbar array of the RPUs is not biased under the midrange condition; and recording a sequence of the low values and the high values of the random output responsive to reinforcing the low values and the high values of the random output.
9. The computer program product of claim 8, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response.
10. The computer program product of claim 8, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response of the low values and the high values in the about equal proportions.
11. The computer program product of claim 8, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses under the midrange condition that drive the resistances of the RPUs.
12. The computer program product of claim 8, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses to shift resistance values up and down to ensure the low values and the high values in the about equal proportions.
13. The computer program product of claim 8, wherein the crossbar array of the RPUs is configured to be authenticated by reading out a verification sequence that matches the random output, the verification sequence being read out under a different condition than the midrange condition.
14. The computer program product of claim 8 further comprising preventing the resistances of the RPUs from being subsequently programmed, responsive to recording the sequence of the low values and the high values of the random output.
15. A system comprising: a memory having computer readable instructions; and one or more processors for executing the computer readable instructions, the computer readable instructions controlling the one or more processors to perform operations comprising: biasing a crossbar array of resistive processing units (RPUs) under a midrange condition, the midrange condition causing resistances of the RPUs to result in a random output of low values and high values in about equal proportions; reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to a state that forces the low values and the high values having resulted from the midrange condition, reinforcing the low values and the high values making the random output permanent even when the crossbar array of the RPUs is not biased under the midrange condition; and recording a sequence of the low values and the high values of the random output responsive to reinforcing the low values and the high values of the random output.
16. The system of claim 15, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response.
17. The system of claim 15, wherein in response to receiving predefined voltages under the midrange condition, the RPUs generate a stochastic response of the low values and the high values in the about equal proportions.
18. The system of claim 15, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses under the midrange condition that drive the resistances of the RPUs.
19. The system of claim 15, wherein reinforcing the low values and the high values of the random output by setting the resistances of the RPUs to the state that forces the low values and the high values having resulted from the midrange condition comprises using voltage pulses to shift resistance values up and down to ensure the low values and the high values in the about equal proportions.
20. The system of claim 15, wherein the crossbar array of the RPUs is configured to be authenticated by reading out a verification sequence that matches the random output, the verification sequence being read out under a different condition than the midrange condition.
GB2217559.0A 2020-04-30 2021-03-19 Secure chip identification using resistive processing unit as a physically unclonable function Active GB2610344B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/862,663 US11501023B2 (en) 2020-04-30 2020-04-30 Secure chip identification using resistive processing unit as a physically unclonable function
PCT/IB2021/052314 WO2021220071A1 (en) 2020-04-30 2021-03-19 Secure chip identification using resistive processing unit as a physically unclonable function

Publications (3)

Publication Number Publication Date
GB202217559D0 GB202217559D0 (en) 2023-01-11
GB2610344A true GB2610344A (en) 2023-03-01
GB2610344B GB2610344B (en) 2025-01-15

Family

ID=78292966

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2217559.0A Active GB2610344B (en) 2020-04-30 2021-03-19 Secure chip identification using resistive processing unit as a physically unclonable function

Country Status (8)

Country Link
US (1) US11501023B2 (en)
JP (1) JP7553201B2 (en)
CN (1) CN115191030B (en)
AU (1) AU2021264045B2 (en)
DE (1) DE112021000582T5 (en)
GB (1) GB2610344B (en)
IL (1) IL296249B2 (en)
WO (1) WO2021220071A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11240047B2 (en) 2019-12-16 2022-02-01 Analog Devices International Unlimited Company Capacitor based physical unclonable function
US11734459B2 (en) * 2020-08-05 2023-08-22 Analog Devices International Unlimited Company Monitoring a physical unclonable function
US11394566B2 (en) 2020-08-05 2022-07-19 Analog Devices International Unlimited Company Physical unclonable function configuration and readout
US11837281B2 (en) 2021-08-31 2023-12-05 Integrated Circuit, Interface Circuit And Method Integrated circuit, interface circuit and method
US12099616B2 (en) * 2021-11-15 2024-09-24 International Business Machines Corporation Physically unclonable function based on a phase change material array
US11864474B2 (en) 2022-03-17 2024-01-02 International Business Machines Corporation ReRAM analog PUF using filament location
US11967372B2 (en) * 2022-03-22 2024-04-23 Micron Technology, Inc. Shared decoder architecture for three-dimensional memory arrays

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104541369A (en) * 2012-08-10 2015-04-22 国际商业机器公司 Robust Physical Unclonability in Device Authentication
CN107615285A (en) * 2015-03-05 2018-01-19 美国亚德诺半导体公司 The Verification System and device encrypted including the unclonable function of physics and threshold value
US20180075338A1 (en) * 2016-09-12 2018-03-15 International Business Machines Corporation Convolutional neural networks using resistive processing unit array
CN107924227A (en) * 2015-10-20 2018-04-17 国际商业机器公司 Resistance processing unit
US20190325291A1 (en) * 2018-04-20 2019-10-24 International Business Machines Corporation Resistive processing unit with multiple weight readers
CN110506282A (en) * 2017-04-14 2019-11-26 国际商业机器公司 The more new management of RPU array
WO2020074996A1 (en) * 2018-10-11 2020-04-16 International Business Machines Corporation Alignment techniques to match symmetry point as zero-weight point in analog crosspoint arrays

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201110560D0 (en) 2011-06-22 2011-08-03 Sonitor Technologies As Radio communication system
JP5689569B2 (en) 2013-02-01 2015-03-25 パナソニックIpマネジメント株式会社 Nonvolatile memory device
EP2833287B1 (en) * 2013-07-29 2017-07-19 Nxp B.V. A puf method using and circuit having an array of bipolar transistors
US9343135B2 (en) 2013-09-09 2016-05-17 Qualcomm Incorporated Physically unclonable function based on programming voltage of magnetoresistive random-access memory
US20150071432A1 (en) * 2013-09-09 2015-03-12 Qualcomm Incorporated Physically unclonable function based on resistivity of magnetoresistive random-access memory magnetic tunnel junctions
US9806718B2 (en) 2014-05-05 2017-10-31 Analog Devices, Inc. Authenticatable device with reconfigurable physical unclonable functions
US9946858B2 (en) 2014-05-05 2018-04-17 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
KR101566949B1 (en) 2014-06-30 2015-11-13 한국전자통신연구원 Reconfigurable physically unclonable function apparatus and operating method thereof
US9548113B2 (en) * 2014-11-21 2017-01-17 Panasonic Intellectual Property Management Co., Ltd. Tamper-resistant non-volatile memory device
US9985791B2 (en) 2015-08-13 2018-05-29 Arizona Board Of Regents Acting For And On Behalf Of Northern Arizona University Physically unclonable function generating systems and related methods
WO2017105517A1 (en) * 2015-12-18 2017-06-22 Hewlett Packard Enterprise Development Lp Memristor crossbar arrays to activate processors
US10664745B2 (en) 2016-06-29 2020-05-26 International Business Machines Corporation Resistive processing units and neural network training methods
US10911229B2 (en) 2016-08-04 2021-02-02 Macronix International Co., Ltd. Unchangeable physical unclonable function in non-volatile memory
US10469271B2 (en) 2016-08-04 2019-11-05 Macronix International Co., Ltd. Physical unclonable function for non-volatile memory
US9997244B1 (en) 2016-11-29 2018-06-12 Taiwan Semiconductor Manufacturing Co., Ltd. RRAM-based authentication circuit
US10708041B2 (en) * 2017-04-30 2020-07-07 Technion Research & Development Foundation Limited Memresistive security hash function
US10103895B1 (en) * 2017-10-13 2018-10-16 Macronix International Co., Ltd. Method for physically unclonable function-identification generation and apparatus of the same
CN111630598B (en) 2018-01-23 2023-04-11 新唐科技日本株式会社 Nonvolatile memory device and writing method thereof
US10319439B1 (en) 2018-05-15 2019-06-11 International Business Machines Corporation Resistive processing unit weight reading via collection of differential current from first and second memory elements
US10560095B2 (en) * 2018-05-23 2020-02-11 Analog Devices, Inc. Impedance-based physical unclonable function
US11277271B2 (en) * 2019-07-31 2022-03-15 Nxp Usa, Inc. SRAM based physically unclonable function and method for generating a PUF response
US11240047B2 (en) * 2019-12-16 2022-02-01 Analog Devices International Unlimited Company Capacitor based physical unclonable function

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104541369A (en) * 2012-08-10 2015-04-22 国际商业机器公司 Robust Physical Unclonability in Device Authentication
CN107615285A (en) * 2015-03-05 2018-01-19 美国亚德诺半导体公司 The Verification System and device encrypted including the unclonable function of physics and threshold value
CN107924227A (en) * 2015-10-20 2018-04-17 国际商业机器公司 Resistance processing unit
US20180075338A1 (en) * 2016-09-12 2018-03-15 International Business Machines Corporation Convolutional neural networks using resistive processing unit array
CN110506282A (en) * 2017-04-14 2019-11-26 国际商业机器公司 The more new management of RPU array
US20190325291A1 (en) * 2018-04-20 2019-10-24 International Business Machines Corporation Resistive processing unit with multiple weight readers
WO2020074996A1 (en) * 2018-10-11 2020-04-16 International Business Machines Corporation Alignment techniques to match symmetry point as zero-weight point in analog crosspoint arrays

Also Published As

Publication number Publication date
DE112021000582T5 (en) 2022-12-08
AU2021264045B2 (en) 2024-03-28
CN115191030A (en) 2022-10-14
JP7553201B2 (en) 2024-09-18
AU2021264045A1 (en) 2022-09-22
GB2610344B (en) 2025-01-15
JP2023523233A (en) 2023-06-02
IL296249B1 (en) 2025-04-01
WO2021220071A1 (en) 2021-11-04
US20210342489A1 (en) 2021-11-04
IL296249A (en) 2022-11-01
US11501023B2 (en) 2022-11-15
IL296249B2 (en) 2025-08-01
CN115191030B (en) 2023-05-23
GB202217559D0 (en) 2023-01-11

Similar Documents

Publication Publication Date Title
GB2610344A (en) Secure chip identification using resistive processing unit as a physically unclonable function
US10885976B2 (en) Semiconductor memory device including phase change memory device and method of accessing phase change memory device
JP6399523B2 (en) Method and memory device for protecting the contents of a memory device
CN109686391B (en) Non-volatile memory device and operating method and non-volatile memory package
US12511232B2 (en) Trim setting determination on a memory device
EP3210208B1 (en) Generating a representative logic indicator of grouped memristors
KR20160117713A (en) Semiconductor apparatus and operating method thereof
US11822794B2 (en) Memory system and operation method of the memory system
KR20210132723A (en) Proof of data in memory
KR20210130240A (en) Validate data stored in memory using cryptographic hashes
TWI606362B (en) Accessing system and method thereof
TW201511005A (en) Phase change memory, writing method thereof and reading method thereof
CN113470723A (en) Read retry test method and device, readable storage medium and electronic equipment
WO2019074500A1 (en) Memory devices including execution trace buffers
US11380394B2 (en) Voltage profile for reduction of read disturb in memory cells
CN106158015A (en) Resistive formula storage arrangement, read/write circuit unit and operational approach thereof
CN111625194B (en) Data reading method of storage medium, storage system and storage device
EP3610379B1 (en) Transaction identification
KR20240162948A (en) Semiconductor devices and semiconductor systems related to row hammer refresh
US10579290B2 (en) Option code providing circuit and providing method thereof
TW201913670A (en) Data read method and a non-volatile memory apparatus using the same
CN115707342A (en) Storage control method and apparatus, storage method and apparatus, electronic device, and medium
CN118072781A (en) Processing method, device, ferroelectric memory circuit, storage medium and program product
KR20220137963A (en) Perform program operation based on high voltage pulse to safely erase data
US20170308304A1 (en) Committing altered metadata to a non-volatile storage device

Legal Events

Date Code Title Description
746 Register noted 'licences of right' (sect. 46/1977)

Effective date: 20250218